You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
« Previous
Version 2
Next »
This document illustrates how to setup Keycloak for AAI multi-tenancy support.
Prerequisites
- A Keycloak instance running with administrative credentials
- AAI application (aai-resource or aai-traversal) running and can reach the Keycloak instance
- AAI application should be running with the "keycloak" as one of the active spring profiles
ie: Check values.yaml to see if "keycloak" is included in the profile.active config
# Active spring profiles for the resources microservice
profiles:
active: production, dmaap, aaf-auth, keycloak
Setting up Keycloak's realm, users and roles
- Create a new realm
- Create a client
- Create a client role
- Create a realm role
- Create a user
Running test suites
The test suites has the following sequences
eyJleHRTcnZJbnRlZ1R5cGUiOiIiLCJnQ2xpZW50SWQiOiIiLCJjcmVhdG9yTmFtZSI6IlNhbSBIdWFuZyIsIm91dHB1dFR5cGUiOiJibG9jayIsImxhc3RNb2RpZmllck5hbWUiOiJTYW0gSHVhbmciLCJsYW5ndWFnZSI6ImVuIiwiZGlhZ3JhbURpc3BsYXlOYW1lIjoiIiwic0ZpbGVJZCI6IiIsImF0dElkIjoiMTA3MjUyMjQ5IiwiZGlhZ3JhbU5hbWUiOiJ0ZXN0IHN1aXRlcyBzZXF1ZW5jZSIsImFzcGVjdCI6IiIsImxpbmtzIjoiYXV0byIsImNlb05hbWUiOiJBQUkgTXVsdGktVGVuYW5jeSIsInRic3R5bGUiOiJ0b3AiLCJjYW5Db21tZW50IjpmYWxzZSwiZGlhZ3JhbVVybCI6IiIsImNzdkZpbGVVcmwiOiIiLCJib3JkZXIiOnRydWUsIm1heFNjYWxlIjoiMSIsIm93bmluZ1BhZ2VJZCI6OTI5OTU4MTEsImVkaXRhYmxlIjpmYWxzZSwiY2VvSWQiOjEwNzI1MjMwNSwicGFnZUlkIjoiIiwibGJveCI6dHJ1ZSwic2VydmVyQ29uZmlnIjp7ImVtYWlscHJldmlldyI6IjEifSwib2RyaXZlSWQiOiIiLCJyZXZpc2lvbiI6MSwibWFjcm9JZCI6IjEzOTE5NDRlLWQ4MWQtNDRmMy05NGViLWI2ZjJlNTc1ODI3NyIsInByZXZpZXdOYW1lIjoidGVzdCBzdWl0ZXMgc2VxdWVuY2UucG5nIiwibGljZW5zZVN0YXR1cyI6Ik9LIiwic2VydmljZSI6IiIsImlzVGVtcGxhdGUiOiIiLCJ3aWR0aCI6Ijc1MyIsInNpbXBsZVZpZXdlciI6ZmFsc2UsImxhc3RNb2RpZmllZCI6MTYyODc1NzYxNTAwMCwiZXhjZWVkUGFnZVdpZHRoIjpmYWxzZSwib0NsaWVudElkIjoiIn0=